Resubmissions

24-12-2024 04:38

241224-e9nn6s1pas 10

24-12-2024 04:35

241224-e75jxa1nhw 10

General

  • Target

    Discord Cloner V2.exe

  • Size

    80.5MB

  • Sample

    241224-e9nn6s1pas

  • MD5

    ac75503b2a1cc605c48e3d5db51c9f15

  • SHA1

    c8cbc4055a7c16577638e49ba3d55082be3de581

  • SHA256

    8f64ab06967a8dadc3b5d4d831331097aaf6effbcc04206340a2fcf4fbe87cd9

  • SHA512

    2aa4b3c3bbaf394ddb5d32421a6dd529e0cca9eeec4a65706b60ee6ce80b998aff4a88a2956b30467c61a978e66aa92a31b4252aca4ece1fe9a7a4241685ff82

  • SSDEEP

    1572864:YGKl1WL+smwSk8IpG7V+VPhq+kE7TliwiYgj+h58sMwzerXcxCcJ5AS:xKb7smwSkB05aw+Jwy5verMRA

Malware Config

Targets

    • Target

      Discord Cloner V2.exe

    • Size

      80.5MB

    • MD5

      ac75503b2a1cc605c48e3d5db51c9f15

    • SHA1

      c8cbc4055a7c16577638e49ba3d55082be3de581

    • SHA256

      8f64ab06967a8dadc3b5d4d831331097aaf6effbcc04206340a2fcf4fbe87cd9

    • SHA512

      2aa4b3c3bbaf394ddb5d32421a6dd529e0cca9eeec4a65706b60ee6ce80b998aff4a88a2956b30467c61a978e66aa92a31b4252aca4ece1fe9a7a4241685ff82

    • SSDEEP

      1572864:YGKl1WL+smwSk8IpG7V+VPhq+kE7TliwiYgj+h58sMwzerXcxCcJ5AS:xKb7smwSkB05aw+Jwy5verMRA

    • Enumerates VirtualBox DLL files

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Sets file to hidden

      Modifies file attributes to stop it showing in Explorer etc.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Legitimate hosting services abused for malware hosting/C2

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks